{"id":57807,"date":"2022-11-28T10:00:51","date_gmt":"2022-11-28T10:00:51","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57807"},"modified":"2023-06-05T07:03:43","modified_gmt":"2023-06-05T07:03:43","slug":"attck-mitre-attck-framework-how-to-boost-your-security-backbone","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/","title":{"rendered":"ATT&#038;CK MITRE ATT&#038;CK Framework: How to Boost Your Security Backbone"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57807\" class=\"elementor elementor-57807\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4182de49 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4182de49\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a623d6b\" data-id=\"6a623d6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5552c3 elementor-widget elementor-widget-text-editor\" data-id=\"5552c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> November 28, 2022<br \/><strong>Time:<\/strong> 8.00 am PST,9.30 pm IST,11.00 am EST<br \/><strong>Topic:<\/strong> MITRE ATT&amp;CK Framework: How to Boost Your Security Backbone<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Effective CISOs are always looking for new methods to reassure their senior leaders that they are aware of and prepared for any potential risks to the firm. In today&#8217;s rapidly evolving threat landscape, companies must handle the enormous task of threat awareness, which they can never accomplish entirely alone. That\u2019s why it\u2019s important to adopt an attacker&#8217;s perspective and learn to make smarter decisions to avert costly attacks before businesses can be compromised.<\/p><p>Building a strong cybersecurity posture using MITRE ATT&amp;CK is considered the gold standard. The Adversarial Tactics Techniques and Common Knowledge (ATT&amp;CK) framework was developed in 2013 and first released to the public in 2015. This framework looks at cybersecurity from the point of view of an attacker. Through this unique point of view, you can learn about the most common techniques and tactics that attackers use.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>What is the MITRE ATT&amp;CK framework?<\/li><li>Who uses MITRE ATT&amp;CK and why<\/li><li>The MITRE ATT&amp;CK framework tactics and techniques<\/li><li>MITRE ATT&amp;CK framework use cases<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Eva-Benn.png.webp\" alt=\"Eva Benn\" width=\"200\" \/><strong>Eva Benn<\/strong>, Vice President and Chief Information Security Officer<\/p><p><strong>Bio:<\/strong> Eva is a Senior Security PM Manager at Microsoft. She currently leads the Offensive Security PM team that secures Microsoft&#8217;s largest and most important products and services across Edge devices, Windows OS and Devices, Xbox, Microsoft Game Studios, and more.<\/p><p>Eva has experience in various cybersecurity domains and Big 4 consulting. Her expertise has earned her multiple well-recognized industry certifications such as CISSP, C|EH, CCSP, and Security+. Aside from her lifelong obsession with cybersecurity, Eva is passionate about storytelling and distilling complex security problems into easy-to-understand concepts. As a proven thought leader, she has been an invited speaker at multiple security industry conferences and events.<\/p><p>She serves on the ISACA Puget Sound Chapter Board of Directors and is also a co-founder of Women in Tech Global, an organization that helps drive gender equality, diversity, and inclusion in tech.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/IFtzfRqA5cw\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 28, 2022Time: 8.00 am PST,9.30 pm IST,11.00 am ESTTopic: MITRE ATT&amp;CK Framework: How to Boost Your Security Backbone Watch Now Abstract: Effective CISOs are always looking for new methods to reassure their senior leaders that they are aware of and prepared for any potential risks to the firm. In today&#8217;s rapidly evolving threat&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79007,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57807","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strengthen Your Security Foundation with the MITRE ATT&amp;CK Framework<\/title>\n<meta name=\"description\" content=\"Learn why the ATT&amp;CK MITRE ATT&amp;CK framework is crucial in today&#039;s constantly evolving threat landscape in our webinar led by a subject matter expert.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ATT&amp;CK MITRE ATT&amp;CK Framework: How to Boost Your Security Backbone\" \/>\n<meta property=\"og:description\" content=\"Learn why the ATT&amp;CK MITRE ATT&amp;CK framework is crucial in today&#039;s constantly evolving threat landscape in our webinar led by a subject matter expert.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-28T10:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:03:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/465x310-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"ATT&#038;CK MITRE ATT&#038;CK Framework: How to Boost Your Security Backbone\",\"datePublished\":\"2022-11-28T10:00:51+00:00\",\"dateModified\":\"2023-06-05T07:03:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/\"},\"wordCount\":386,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/465x310-2.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/\",\"name\":\"Strengthen Your Security Foundation with the MITRE ATT&CK Framework\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/465x310-2.jpg\",\"datePublished\":\"2022-11-28T10:00:51+00:00\",\"dateModified\":\"2023-06-05T07:03:43+00:00\",\"description\":\"Learn why the ATT&CK MITRE ATT&CK framework is crucial in today's constantly evolving threat landscape in our webinar led by a subject matter expert.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/465x310-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/465x310-2.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ATT&#038;CK MITRE ATT&#038;CK Framework: How to Boost Your Security Backbone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthen Your Security Foundation with the MITRE ATT&CK Framework","description":"Learn why the ATT&CK MITRE ATT&CK framework is crucial in today's constantly evolving threat landscape in our webinar led by a subject matter expert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/","og_locale":"en_US","og_type":"article","og_title":"ATT&CK MITRE ATT&CK Framework: How to Boost Your Security Backbone","og_description":"Learn why the ATT&CK MITRE ATT&CK framework is crucial in today's constantly evolving threat landscape in our webinar led by a subject matter expert.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-11-28T10:00:51+00:00","article_modified_time":"2023-06-05T07:03:43+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/465x310-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"ATT&#038;CK MITRE ATT&#038;CK Framework: How to Boost Your Security Backbone","datePublished":"2022-11-28T10:00:51+00:00","dateModified":"2023-06-05T07:03:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/"},"wordCount":386,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/465x310-2.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/","name":"Strengthen Your Security Foundation with the MITRE ATT&CK Framework","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/465x310-2.jpg","datePublished":"2022-11-28T10:00:51+00:00","dateModified":"2023-06-05T07:03:43+00:00","description":"Learn why the ATT&CK MITRE ATT&CK framework is crucial in today's constantly evolving threat landscape in our webinar led by a subject matter expert.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/465x310-2.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/465x310-2.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"ATT&#038;CK MITRE ATT&#038;CK Framework: How to Boost Your Security Backbone"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57807"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57807\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79007"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}